Achievement Standard 91070:

Achieved
Merit
Excellence
• identifying and describing key features of operating systems and common application software as they relate to the management of information

• identifying and describing file management procedures

describing ethical issues related to management of information (eg copyright, privacy, file security, appropriateness of the material in its context).
==
==
explaining the purpose of operating systems and the purposes of common application software to manage information

explaining the purpose and conventions of file management procedures and use of storage devices.


explaining how application software and operating system software interact to manage information

justifying the selection of application software to perform a task to manage information

comparing and contrasting the use of different file types for different purposes (eg pdf versus doc, jpeg versus bmp).

Summary of Key To Do's for Achieved:

Answer these questions:

1 - Operating Systems heading
    • What is the definition of an operating system (put it in your own words and paste the link in your report);
    • What are 3 features you've used? (include a screenshot, a description of what feature it shows)
    • Why have you used each feature?
2 - Applications heading
    • What is the definition of a computer application (put it in your own words and paste the link in your report);
    • What are 3 applications you've used?
    • What are 3 features you used in the applications? (take a screenshot of something you created in the app that shows 3 of the features e.g. Word report showing header, word art and bullet points)
3 - File management heading
    • What is a definition of file management (put it in your own words and paste the link in your report)
    • What are at least 2 examples you have done that shows you managed your files
4 - Ethical Issues heading
    • What is a definition of computer ethics (put it in your own words and paste the link in your report)
    • What are at least 2 examples you have done that shows you have considered ethical issues (e.g file security; privacy; copyright; intellectual property;).

What to do second:

  • From your H drive open the Word document - Your first name External 91070 - if you do not have this file, skip down to "What to do first" heading below.
  • Download this worksheet OR get a printed copy from Miss to work on for the period.

What's the difference between Describe; Explain and Evaluate?


Command word
Explanation
Example
Identify what Miss is
wearing…
“If the question says ‘identify’ then I need to actually say what I see”
Miss is wearing a suit with a jacket and a trousers.
Describe what
Miss
is wearing…
“If the question says ‘describe’ then I need to actually say what I see and give a bit of detail like, what it looks like and where it is”
Miss is wearing a grey pinstriped suit. The jacket has two buttons and pockets. The trousers are turned up at the bottom.
Explain what
Miss
is wearing…
“If the question says ‘explain’ then I need to actually give reasons (say why) for what I can see”
Miss is wearing a suit because she is at work and would like to look professional.
Justify what
is wearing…
“If the question says ‘justify’ then I need to actually give a balanced answer (two different opinions) and then give my own opinion.
Some people think Miss dresses too formally as a suit is very business like. Other people think it is right to wear a suit at school so that Miss is taken more seriously. I agree that wearing a suit makes miss look smart and more professional.

What to do first:

  1. Open Microsoft Word 2007 and Save the document onto your H drive as Your first name External 91070
  2. Insert a header called Information Management Concepts
  3. Insert a footer with your page numbers and name
  4. Create 5 headings using the Font Styles - Click change styles to pick your own font and colors
    • Operating Systems
    • Applications
    • File Management
    • Ethical Issues
  5. Save your work again.
  6. Open your Movie from Term 1, Spreadsheet and Report. Use the Snippet tool to take a screen shot of these 3 things and paste it under the heading Applications.
  7. For each screenshot Insert a Text box and write - What the application is; What you used it for; What 2 key features were that you used e.g. Header or Footer/Word Art/Charts/Exporting; Why you used them; If you want to try for Excellence, also say what alternative applications you could've used, and why you settled on Word, Excel and Movie maker.

FYI - you will be adding content to this document throughout the year. DO NOT DELETE it.

2012 External Template Used:






Websites you should read at home to understand important considerations when writing your report:
1.
Operating Systems (O/S):
What is an O/S?http://expertscolumn.com/content/what-operating-system-and-what-does-it-do

http://computer.howstuffworks.com/operating-system.htm

http://en.wikipedia.org/wiki/Operating_system
2.
Applications:
Good visual depiction of system software vs user software -http://www.webopedia.com/TERM/A/application.html

Definition -
http://www.techterms.com/definition/application
2.
File Management -
What is it?
http://www-public.jcu.edu.au/libcomp/computing/computers/JCUPRD_034361

Which ones are you using in your file management?
http://sbinfocanada.about.com/od/datamanagement/a/computerfilemgt.htm

Where and how should you save your files?
NOTE: Where it says My Documents, think of your H:\
Read #s 3-6 http://sbinfocanada.about.com/od/datamanagement/a/computerfilemgt.htm

Read from page 10 - "Working with Files and Folders"
http://www.slideshare.net/Rozy65/windows-resource-guide

File types -
http://www.ehow.com/info_8074383_file-extension-important.html

Why backup your files?
http://www.spamlaws.com/why-computer-backup-important.html

Password security -
http://www.ikeepsafe.org/articles/password-safety-security/
2.
Ethical Issues - a - What has Creative Commons been created for?

b - What does wikipedia have to say about Privacy and Social Networking? Read the heading -
Some questions in computer ethics

c - What is software piracy?

d - Talk about your experience with two of the 10 commandments?
a - http://www.creativecommons.org.nz/about/

b - http://en.wikipedia.org/wiki/Computer_ethics#Identifying_issues

c - http://en.wikipedia.org/wiki/Copyright_infringement_of_software

d - http://en.wikipedia.org/wiki/Ten_Commandments_of_Computer_Ethics
3.
Security Risk:
What are some risks in schools? http://www.techlearning.com/article/45153